/netbsd-src/external/apache2/llvm/dist/clang/include/clang/StaticAnalyzer/Core/BugReporter/ |
H A D | BugType.h | 29 class BugType { 40 BugType(CheckerNameRef CheckerName, StringRef Name, StringRef Cat, 44 BugType(const CheckerBase *Checker, StringRef Name, StringRef Cat, 48 virtual ~BugType() = default; 69 class BuiltinBug : public BugType { 75 : BugType(checker, name, categories::LogicError), desc(description) {} in BuiltinBug() 79 : BugType(checker, name, categories::LogicError), desc(description) {} in BuiltinBug() 82 : BugType(checker, name, categories::LogicError), desc(name) {} in BuiltinBug() 85 : BugType(checker, name, categories::LogicError), desc(name) {} in BuiltinBug()
|
H A D | BugReporter.h | 58 class BugType; variable 130 const BugType& BT; 138 BugReport(Kind kind, const BugType &bt, StringRef desc) in BugReport() 141 BugReport(Kind K, const BugType &BT, StringRef ShortDescription, in BugReport() 151 const BugType& getBugType() const { return BT; } in getBugType() 258 BasicBugReport(const BugType &bt, StringRef desc, PathDiagnosticLocation l) in BasicBugReport() 371 PathSensitiveBugReport(const BugType &bt, StringRef desc, in PathSensitiveBugReport() 375 PathSensitiveBugReport(const BugType &bt, StringRef shortDesc, StringRef desc, in PathSensitiveBugReport() 388 PathSensitiveBugReport(const BugType &bt, StringRef desc, in PathSensitiveBugReport() 395 PathSensitiveBugReport(const BugType &bt, StringRef shortDesc, StringRef desc, [all …]
|
/netbsd-src/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Checkers/MPI-Checker/ |
H A D | MPIBugReporter.h | 28 UnmatchedWaitBugType.reset(new BugType(&CB, "Unmatched wait", MPIError)); in MPIBugReporter() 30 new BugType(&CB, "Double nonblocking", MPIError)); in MPIBugReporter() 31 MissingWaitBugType.reset(new BugType(&CB, "Missing wait", MPIError)); in MPIBugReporter() 74 std::unique_ptr<BugType> UnmatchedWaitBugType; 75 std::unique_ptr<BugType> MissingWaitBugType; 76 std::unique_ptr<BugType> DoubleNonblockingBugType;
|
/netbsd-src/external/apache2/llvm/dist/clang/lib/StaticAnalyzer/Checkers/ |
H A D | CallAndMessageChecker.cpp | 36 mutable std::unique_ptr<BugType> BT_call_null; 37 mutable std::unique_ptr<BugType> BT_call_undef; 38 mutable std::unique_ptr<BugType> BT_cxx_call_null; 39 mutable std::unique_ptr<BugType> BT_cxx_call_undef; 40 mutable std::unique_ptr<BugType> BT_call_arg; 41 mutable std::unique_ptr<BugType> BT_cxx_delete_undef; 42 mutable std::unique_ptr<BugType> BT_msg_undef; 43 mutable std::unique_ptr<BugType> BT_objc_prop_undef; 44 mutable std::unique_ptr<BugType> BT_objc_subscript_undef; 45 mutable std::unique_ptr<BugType> BT_msg_arg; [all …]
|
H A D | PthreadLockChecker.cpp | 170 void reportBug(CheckerContext &C, std::unique_ptr<BugType> BT[], 226 mutable std::unique_ptr<BugType> BT_doublelock[CK_NumCheckKinds]; 227 mutable std::unique_ptr<BugType> BT_doubleunlock[CK_NumCheckKinds]; 228 mutable std::unique_ptr<BugType> BT_destroylock[CK_NumCheckKinds]; 229 mutable std::unique_ptr<BugType> BT_initlock[CK_NumCheckKinds]; 230 mutable std::unique_ptr<BugType> BT_lor[CK_NumCheckKinds]; 236 new BugType{CheckNames[CheckKind], "Double locking", "Lock checker"}); in initBugType() 238 new BugType{CheckNames[CheckKind], "Double unlocking", "Lock checker"}); in initBugType() 239 BT_destroylock[CheckKind].reset(new BugType{ in initBugType() 241 BT_initlock[CheckKind].reset(new BugType{ in initBugType() [all …]
|
H A D | SmartPtrChecker.cpp | 33 static const BugType *NullDereferenceBugTypePtr; 38 BugType NullDereferenceBugType{this, "Null SmartPtr dereference", 54 const BugType *getNullDereferenceBugType() { return NullDereferenceBugTypePtr; } in getNullDereferenceBugType()
|
H A D | NSErrorChecker.cpp | 145 class NSErrorDerefBug : public BugType { 148 : BugType(Checker, "NSError** null dereference", in NSErrorDerefBug() 152 class CFErrorDerefBug : public BugType { 155 : BugType(Checker, "CFErrorRef* null dereference", in CFErrorDerefBug() 276 BugType *bug = nullptr; in checkEvent()
|
H A D | DeadStoresChecker.cpp | 215 const char *BugType = nullptr; in Report() local 221 BugType = "Dead initialization"; in Report() 245 BugType = "Dead increment"; in Report() 248 if (!BugType) BugType = "Dead assignment"; in Report() 256 BugType = "Dead nested assignment"; in Report() 264 BR.EmitBasicReport(AC->getDecl(), Checker, BugType, categories::UnusedCode, in Report()
|
H A D | VirtualCallChecker.cpp | 46 mutable std::unique_ptr<BugType> BT_Pure, BT_Impure; 144 const std::unique_ptr<BugType> &BT = IsPure ? BT_Pure : BT_Impure; in checkPreCall() 210 Chk->BT_Pure = std::make_unique<BugType>(Mgr.getCurrentCheckerName(), in registerPureVirtualCallChecker() 219 Chk->BT_Impure = std::make_unique<BugType>( in registerVirtualCallChecker()
|
H A D | SimpleStreamChecker.cpp | 56 std::unique_ptr<BugType> DoubleCloseBugType; 57 std::unique_ptr<BugType> LeakBugType; 109 new BugType(this, "Double fclose", "Unix Stream API Error")); in SimpleStreamChecker() 113 new BugType(this, "Resource Leak", "Unix Stream API Error", in SimpleStreamChecker()
|
H A D | TaintTesterChecker.cpp | 27 mutable std::unique_ptr<BugType> BT; 43 BT.reset(new BugType(this, "Tainted data", "General")); in initBugType()
|
H A D | NSAutoreleasePoolChecker.cpp | 34 mutable std::unique_ptr<BugType> BT; 61 BT.reset(new BugType(this, "Use -drain instead of -release", in checkPreObjCMessage()
|
H A D | CloneChecker.cpp | 38 mutable std::unique_ptr<BugType> BT_Exact, BT_Suspicious; 112 BT_Exact.reset(new BugType(this, "Exact code clone", "Code clone")); in reportClones() 159 new BugType(this, "Suspicious code clone", "Code clone")); in reportSuspiciousClones()
|
H A D | MmapWriteExecChecker.cpp | 34 mutable std::unique_ptr<BugType> BT; 64 BT.reset(new BugType(this, "W^X check fails, Write Exec prot flags set", "Security")); in checkPreCall()
|
H A D | DeleteWithNonVirtualDtorChecker.cpp | 39 mutable std::unique_ptr<BugType> BT; 89 BT.reset(new BugType(this, in checkPreStmt()
|
H A D | NonNullParamChecker.cpp | 34 mutable std::unique_ptr<BugType> BTAttrNonNull; 35 mutable std::unique_ptr<BugType> BTNullRefArg; 285 BTAttrNonNull.reset(new BugType( in genReportNullAttrNonNull()
|
H A D | UnixAPIChecker.cpp | 42 mutable std::unique_ptr<BugType> BT_open, BT_pthreadOnce; 69 mutable std::unique_ptr<BugType> BT_mallocZero; 93 std::unique_ptr<BugType> &BT, in LazyInitialize() 97 BT.reset(new BugType(Checker, name, categories::UnixAPI)); in LazyInitialize()
|
H A D | MacOSXAPIChecker.cpp | 34 mutable std::unique_ptr<BugType> BT_dispatchOnce; 140 BT_dispatchOnce.reset(new BugType(this, "Improper use of 'dispatch_once'", in CheckDispatchOnce()
|
H A D | DebugContainerModeling.cpp | 30 std::unique_ptr<BugType> DebugMsgBugType; 59 new BugType(this, "Checking analyzer assumptions", "debug", in DebugContainerModeling()
|
H A D | FuchsiaHandleChecker.cpp | 189 BugType LeakBugType{this, "Fuchsia handle leak", "Fuchsia Handle Error", 191 BugType DoubleReleaseBugType{this, "Fuchsia handle double release", 193 BugType UseAfterReleaseBugType{this, "Fuchsia handle use after release", 195 BugType ReleaseUnownedBugType{ 222 const SourceRange *Range, const BugType &Type, 651 const BugType &Type, StringRef Msg) const { in reportBug()
|
H A D | InvalidatedIteratorChecker.cpp | 34 std::unique_ptr<BugType> InvalidatedBugType; 54 new BugType(this, "Iterator invalidated", "Misuse of STL APIs")); in InvalidatedIteratorChecker()
|
H A D | DebugIteratorModeling.cpp | 30 std::unique_ptr<BugType> DebugMsgBugType; 62 new BugType(this, "Checking analyzer assumptions", "debug", in DebugIteratorModeling()
|
H A D | DereferenceChecker.cpp | 35 BugType BT_Null{this, "Dereference of null pointer", categories::LogicError}; 36 BugType BT_Undef{this, "Dereference of undefined pointer value", 125 const BugType *BT = nullptr; in reportBug()
|
H A D | ObjCContainersChecker.cpp | 33 mutable std::unique_ptr<BugType> BT; 36 BT.reset(new BugType(this, "CFArray API", in initBugType()
|
/netbsd-src/external/apache2/llvm/dist/clang/lib/Analysis/plugins/SampleAnalyzer/ |
H A D | MainCallChecker.cpp | 11 mutable std::unique_ptr<BugType> BT; 37 BT.reset(new BugType(this, "call to main", "example analyzer plugin")); in checkPreStmt()
|